WhisperX tag archive

#symlink attack

This page collects WhisperX intelligence signals tagged #symlink attack. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (3)

The Lab · 2026-04-09 10:27:28 · GitHub Issues

1. Kyverno Security Flaw CVE-2026-32282: Linux Symlink Race Condition Bypasses Root Directory Restriction

A critical vulnerability in Kyverno, tracked as CVE-2026-32282, exposes a race condition that can allow a malicious symlink to bypass the tool's root directory security boundary. The flaw resides in the `Root.Chmod` function, which is designed to prevent operations on files outside a specified root directory. However, ...

The Lab · 2026-04-21 20:22:55 · GitHub Issues

2. Python-dotenv v1.2.1 Security Flaw: CVE-2026-28684 Allows Local Attackers to Overwrite Arbitrary Files

A critical security vulnerability in the widely-used python-dotenv library exposes systems to local file overwrite attacks. The flaw, tracked as CVE-2026-28684 (GHSA-mf9w-mj56-hr94), resides in the `set_key()` and `unset_key()` functions. These functions follow symbolic links when rewriting `.env` files, creating a pat...

The Lab · 2026-05-02 19:54:06 · GitHub Issues

3. GitHub Action Vulnerability Allows Sensitive File Exfiltration via Symlink in Pull Request Workflows

A security vulnerability in a code review GitHub Action's `prepare` workflow allows malicious pull requests to read and exfiltrate sensitive system files from the runner environment. The flaw, located in the `src/prepare/main.ts` module, stems from the action accepting a `review-reference-file` input and reading the sp...